[Oisf-devel] [COMMIT] OISF branch, master, updated. suricata-4.0.1-30-g89b656d

OISF Git noreply at openinfosecfoundation.org
Mon Nov 20 17:35:26 UTC 2017


This is an automated email from the git hooks/post-receive script. It was
generated because a ref change was pushed to the repository containing
the project "OISF".

The branch, master has been updated
       via  89b656d8eed0c8ebddc960a06f0434819abdc673 (commit)
       via  63e1371c8bd26f684a3e9afe3849e1d737435194 (commit)
       via  cb70d85c692df3e96495fa427429782add092d4d (commit)
       via  094632730ee2230ad3b2b690ea1daa528a421d8f (commit)
       via  2e27a5df6b6cee7a3fdd4b6e0709a38f925ac4ad (commit)
      from  f3fea60bae3e61f27870ccc7b7f00591b8f6a188 (commit)

Those revisions listed above that are new to this repository have
not appeared on any other notification email; so we list those
revisions in full, below.

- Log -----------------------------------------------------------------
commit 89b656d8eed0c8ebddc960a06f0434819abdc673
Author: Danny Browning <danny.browning at protectwise.com>
Date:   Mon Nov 6 16:10:02 2017 -0700

    unix socket: don't loose events when offline
    
    https://redmine.openinfosecfoundation.org/issues/2215
    
    Fixes issue with events being dropped since socket was non-blocking for
    offline run modes.
    
    Add a method for determining offline from run mode. Make sure SCInstance
    offline is set correctly. Use current run mode to set socket flags.

commit 63e1371c8bd26f684a3e9afe3849e1d737435194
Author: Alexander Gozman <a.gozman at securitycode.ru>
Date:   Thu Nov 9 11:55:47 2017 +0000

    syslog: treat SC_LOG_PERF messages as LOG_DEBUG
    
    SCLogMapLogLevelToSyslogLevel(): treat SC_LOG_PERF messages as LOG_DEBUG
    
    Previously, when logging to syslog, perf events had a default EMERG priority,
    which could be a bit confusing.

commit cb70d85c692df3e96495fa427429782add092d4d
Author: Wolfgang Hotwagner <code at feedyourhead.at>
Date:   Sun Nov 19 14:05:04 2017 +0000

    conf: fix NULL-pointer dereference in CoredumpLoadConfig
    
    An empty value for coredump.max-dump in the config-file leads to a segfault because of a NULL-pointer dereference in CoredumpLoadConfig().
    
    Here is a configuration example:
    
    coredump.max-dump: []
    
    This lets suricata crash with a segfault:
    
    ASAN-output:
    ==9412==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f22e851aa28 bp 0x7ffd90006fc0 sp 0x7ffd90006740 T0)
        0 0x7f22e851aa27 in strcasecmp (/usr/lib/x86_64-linux-gnu/libasan.so.3+0x51a27)
        1 0x5608a7ec0108 in CoredumpLoadConfig /root/suricata-1/src/util-coredump-config.c:52
        2 0x5608a7e8bb22 in PostConfLoadedSetup /root/suricata-1/src/suricata.c:2752
        3 0x5608a7e8c577 in main /root/suricata-1/src/suricata.c:2892
        4 0x7f22e4c622b0 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x202b0)
        5 0x5608a7a30c59 in _start (/usr/local/bin/suricata+0xc4c59)
    
    Bug #2276

commit 094632730ee2230ad3b2b690ea1daa528a421d8f
Author: Wolfgang Hotwagner <code at feedyourhead.at>
Date:   Fri Nov 17 23:25:08 2017 +0000

    conf: fix NULL-pointer dereference in ConfGetInt
    
    If there are empty values in the config-file where integer values are expected, strtoimax in the ConfGetInt-function will segfault because of NULL-pointer dereference.
    
    Here is a configuration example:
    
    pcre.match-limit: []
    
    This will let suricata crash with a segfault.
    ASAN-output:
    
    ASAN:DEADLYSIGNAL =================================================================
    16951ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7fa690e3ccc5 bp 0x000000000000 sp 0x7ffd0d770ad0 T0)
    0 0x7fa690e3ccc4 (/lib/x86_64-linux-gnu/libc.so.6+0x36cc4)
    1 0x7fa6946a6534 in strtoimax (/usr/lib/x86_64-linux-gnu/libasan.so.3+0x44534)
    2 0x55e0aeba6499 in ConfGetInt /root/suricata-1/src/conf.c:390
    3 0x55e0aed2545d in DetectPcreRegister /root/suricata-1/src/detect-pcre.c:99
    4 0x55e0aec1b4ce in SigTableSetup /root/suricata-1/src/detect.c:3783
    5 0x55e0aeeed58d in PostConfLoadedSetup /root/suricata-1/src/suricata.c:2690
    6 0x55e0aeeee4f2 in main /root/suricata-1/src/suricata.c:2892
    7 0x7fa690e262b0 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x202b0)
    8 0x55e0aea92d39 in _start (/usr/local/bin/suricata+0xc7d39)
    
    AddressSanitizer can not provide additional info.
    SUMMARY: AddressSanitizer: SEGV (/lib/x86_64-linux-gnu/libc.so.6+0x36cc4)
    
    This commit fixes Ticket #2275

commit 2e27a5df6b6cee7a3fdd4b6e0709a38f925ac4ad
Author: Wolfgang Hotwagner <code at feedyourhead.at>
Date:   Fri Nov 17 17:47:41 2017 +0000

    conf: fix NULL-pointer dereference in ParseSizeString
    
    If someone accidently writes invalid characters in some parts of the suricata.yaml-configfile, the size-parameter of the ParseSizeString-function becomes NULL and gets dereferenced. Suricata crashes with SEGV. This commit fixes Ticket #2274
    
    The following config value leads to a Segfault:
    app-layer.protocols.smtp.inspected-tracker.content-inspect-window: *4096

-----------------------------------------------------------------------

Summary of changes:
 src/conf.c                 |  6 ++++++
 src/runmodes.c             | 14 ++++++++++++++
 src/runmodes.h             |  2 ++
 src/suricata.c             | 11 ++---------
 src/suricata.h             |  1 -
 src/util-coredump-config.c |  4 ++++
 src/util-debug.c           |  1 +
 src/util-logopenfile.c     |  2 +-
 src/util-misc.c            | 12 ++++++++++++
 9 files changed, 42 insertions(+), 11 deletions(-)


hooks/post-receive
-- 
OISF


More information about the Oisf-devel mailing list